APPENDIX B

Network Site Survey

Guidance

1. Critical information assets that are electronically available only on individual machines are not the subject of this survey. Critical information assets include proprietary data, databases, trade secrets, human resources data, cost data, and other similar information.

2. All critical information assets accessible via networks (not media stored in repositories) are the subject of this survey.

3. The purpose of this survey is to collect preliminary information on the cyber protections at each site. These are categorized as:

a. Detection or Entry Control, such as

i. Passwords

ii. Sniffers

iii. Audits

iv. Real-time monitoring

v. Intrusion Detection System software

b. Delay, such as

i. Encryption

Get Design and Evaluation of Physical Protection Systems, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.